Which solution will meet these requirements?
A security team is conducting an audit for a financial company.The security team discovers that the database credentials of an Amazon RDS for MySQL DB instance are hardcoded in the source code.The source code is stored in a shared location for automatic deployment and is exposed to all users who can access the location.A database specialist must use encryption to ensure that the credentials are not visible in the source code.Which solution will meet these requirements?Read More →